Concept Guide

Enabling SNMP Traps for Root Elections and Topology Changes.................................................................... 805
Modifying Interface Parameters.................................................................................................................................. 805
Enabling SNMP Traps for Root Elections and Topology Changes.......................................................................... 805
Inuencing RSTP Root Selection................................................................................................................................ 805
Conguring an EdgePort.............................................................................................................................................. 806
Conguring Fast Hellos for Link State Detection.......................................................................................................807
44 Software-Dened Networking (SDN)...................................................................................................... 808
45 Security...................................................................................................................................................809
AAA Accounting.............................................................................................................................................................809
Conguration Task List for AAA Accounting........................................................................................................809
RADIUS Accounting..................................................................................................................................................811
AAA Authentication........................................................................................................................................................817
Conguration Task List for AAA Authentication................................................................................................... 817
Obscuring Passwords and Keys...................................................................................................................................820
AAA Authorization......................................................................................................................................................... 820
Privilege Levels Overview........................................................................................................................................821
Conguration Task List for Privilege Levels...........................................................................................................821
RADIUS........................................................................................................................................................................... 825
RADIUS Authentication...........................................................................................................................................825
Conguration Task List for RADIUS.......................................................................................................................827
Support for Change of Authorization and Disconnect Messages packets...................................................... 830
TACACS+.........................................................................................................................................................................841
Conguration Task List for TACACS+....................................................................................................................841
TACACS+ Remote Authentication.........................................................................................................................843
Command Authorization.........................................................................................................................................844
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 844
Enabling SCP and SSH................................................................................................................................................. 844
Using SCP with SSH to Copy a Software Image................................................................................................ 845
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 846
Conguring When to Re-generate an SSH Key ..................................................................................................846
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 847
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 847
Conguring the HMAC Algorithm for the SSH Client.........................................................................................848
Conguring the SSH Server Cipher List...............................................................................................................849
Conguring the SSH Client Cipher List................................................................................................................ 849
Conguring DNS in the SSH Server..................................................................................................................... 850
Secure Shell Authentication...................................................................................................................................850
Troubleshooting SSH...............................................................................................................................................853
Telnet...............................................................................................................................................................................853
VTY Line and Access-Class Conguration................................................................................................................. 853
VTY Line Local Authentication and Authorization............................................................................................... 853
VTY Line Remote Authentication and Authorization...........................................................................................854
VTY MAC-SA Filter Support.................................................................................................................................. 854
Role-Based Access Control..........................................................................................................................................855
Contents
25